Home page logo

fulldisclosure logo Full Disclosure mailing list archives

Re: Chinese Professor Cracks Fifth Data SecurityAlgorithm (SHA-1)
From: "Dude VanWinkle" <dudevanwinkle () gmail com>
Date: Sat, 24 Mar 2007 10:24:26 -0400

On 3/23/07, Michael Silk <michaelslists () gmail com> wrote:
On 3/23/07, Dave No, not that one Korn <davek_throwaway () hotmail com> wrote:
Tim wrote:

On Wed, Mar 21, 2007 at 06:45:19PM +0300, 3APA3A wrote:
Dear Michael Silk,

First,  by  reading  'crack'  I thought lady can recover full
message by it's signature. After careful reading she can bruteforce
collisions 2000 times faster.

Both of you guys are confused.

First off Michael: this is old news.  It doesn't seem to indicate that
finding collisions is any faster than 2^63, which was reported quite
some time ago[1].

  It's not just old news, but old old news, since we already had this
discussion about how it was old news back in january when the piece was

yes yes yes. i have a bad memory. i don't read articles before posting them.
anyone else want to take a shot?

OK.. your parents have a questionable heritage.

there, take that buddy!


Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]